- Steven Gilbert
- December 15, 2022
- in General
How to Protect Yourself from Cyber Crimes
Identity Theft is a Problem
Source: 2019 Experian
Source: U.S. Department of Justice, Javelin Strategy & Research
Source: SANS Institute
What can you do to prevent this?
“If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle.” ― Sun Tzu, The Art of WarSource
1
Know the Enemy
What is it?
Cybercriminals pretend to be a trustworthy source in order to acquire sensitive personal information such as usernames, passwords, social security numbers, and credit card details
What does it look like?
An email from a seemingly legitimate email address instructs you to click on a link to take action (e.g., “validate your account,” “confirm your identity,” “access your tax refund”). The link brings you to a website requiring you to enter your personal information
What’s the impact?
Victims of phishing may have malware installed on their computer systems or have their identity stolen.
How can you defend against it?
1) Hover over questionable links to reveal the true destination before clicking.
2) Beware that secure websites start with https, not http.
What is it?
A fake email header that gives the impression the email is from someone or somewhere other than the actual source, with the goal of tricking the recipient into opening and responding to the email. Phone spoofing is a comparable common cyber threat using a similar phone number.
How does it happen?
The cybercriminal creates an email address nearly identical to your email address (i.e., off by a character).
What’s the impact?
Similar to the other cyberattacks we’ve discussed, your money is stolen, and you become the victim of fraud and/or identity theft.
How can you defend against it?
1) Carefully check the incoming emails for the proper email address and the accuracy of the spelling of the sender’s name.
2) If an email or phone call are questionable, contact the sender directly, using the email address or phone number you have on file for that individual.
What is it?
This involves manipulating or impersonating others to divulge sensitive, private information, and then demanding financial transactions be executed to avoid consequences.
What’s the impact?
The cybercriminal commits fraud, steals your money, and disappears.
How can you defend against it?
1) Be selective about who you allow to join your social networks.
2) Be cautious about the information you choose to share on social media, keeping your personal information private (e.g., home address, phone number, employer, vacation dates, birthdate).
How does it work?
Malicious software is created to damage/disable computers and computer systems, steal data, or gain unauthorized access to networks.
What does it look like?
Examples of malware include viruses, worms, trojan horses, ransomware, and spyware.
How does it happen?
Malware may be installed on a computer when a user clicks an unsafe link, opens an infected file, or visits a legitimate website that could contain adware.
- Nearly 20% of all internet users experienced a malware attack of some kind. Source: Kaspersky Security Bulletin ‘19
- 94% of malware was delivered by email. Source: 2019 Verizon Data Breach Investigations Report
- The #1 disguise for distributing malware– fake invoices. Source: 2018 Symantec Internet Security Threat Report
- A man stole over $100 million from Google and Facebook between 2013 and 2015 by sending fake invoices. https://www.npr.org/2019/03/25/706715377/man-pleads-guilty-to-phishing-scheme-that-fleeced-facebook-google-of-100-million
What’s the impact?
Malware can delete files or directory information, or it may allow attackers to covertly gather personal data, including financial information and usernames and passwords.
How can you defend against it?
1) Install the most up-to-date antivirus and anti-spyware software on all devices that connect to the Internet and run regular scans to update the software when available.
2) Make sure your networking equipment and computers are all still supported by the manufacturer.
2
Know Yourself
Username & Passwords
Do
- Create passwords that are long and complex. The longer the password the harder it is to break. Adding upper- and lowercase letters, numbers, and characters can strengthen password.
- Use unique passwords for sensitive websites. If a cyber-criminal obtains one password, they cannot get into all of your accounts, known as credential replay.
- Change your passwords regularly. If a cyber-criminal obtains a list with your passwords, they will be out of date.
- Enable Two-Factor Authentication. A cyber-criminal may get a password but they would also need access to your phone or email to go further.
- Consider using a password manager enabling you to create longer and more complex passwords.
Don't
- Don't use information in your password that is easily found online. Your address, spouses name, kids names, even pets names are all examples.
- Don't share your password with others
- Don't use other personal information like your Social Security Number, Date of Birth, or other personal data when creating passwords.
80% of confirmed data breaches involved compromised or stolen passwords. Source: Verizon 2019 Data Breach Investigations Report
Sharing Information Online
Do
- Be very selective about what information you share online.
- Set privacy and security setting on web devices.
Don't
- Don't share your personal information like home address, phone number, and date of birth unless it's a credible website.
- Don't share personal information about family or friends.
Do
- Use extra caution when reviewing unsolicited emails.
- Consider a separate email address for financial transactions.
- Delete emails that include financial information.
- Remember to hover over links before clicking them!
- Use spam filters.
Don't
- Don't use your email to store personal information.
- Don't click on links or pop-up ads in unsolicited emails.
- Don't download email attachments unless you are confident it is a safe document.
- NEVER use routing and account information sent to you in email. ALWAYS verbally confirm the instructions.
Equipment
Do
- Install the most up-to-date antivirus and anti-spyware software
- Perform regular scans for updates of software and install the latest version or patches.
- Dispose of old devices securely by backing up and removing all data from the device.
Don't
- Don't purchase networking devices secondhand
- Don't forget to set up a passcode or PIN and auto-lock on mobile devices
- Don't use free or found USB drives
- Don't call the number on the pop up on your computer.
60% of data breaches were linked to vulnerability where a patch was available but not applied. Source: 2019 Ponemon Costs and Consequences of Gaps in Vulnerability Response
How Gilbert Wealth Protects Your Data
- Cybersecurity Policy and Regular Cybersecurity Reviews
- Third Party Tools are reviewed for security practices
- Provide resources for clients to better protect themselves
- Processes in place to prevent unauthorized access and verify transactions
Other Useful Resources
- Forward suspicious email to: reportphishing@apwg.org
- Visit https://www.identitytheft.gov to report identify theft and get a recovery plan
- Visit https://www.ic3.gov/ to report cybercrime complaints